Nmap简介

Nmap是一个网络连接端扫描软件,用来扫描网上电脑开放的网络连接端。确定哪些服务运行在哪些连接端,并且推断计算机运行哪个操作系统(这是亦称 fingerprinting)。它是网络管理员必用的软件之一,以及用以评估网络系统安全。

地址:http://www.nmap.com.cn/

其基本功能有三个:

(1)是扫描主机端口,嗅探所提供的网络服务

(2)是探测一组主机是否在线

(3)还可以推断主机所用的操作系统,到达主机经过的路由,系统已开放端口的软件版本

 

nmap端口状态解析
open : 应用程序在该端口接收 TCP 连接或者 UDP 报文。 
closed :关闭的端口对于nmap也是可访问的, 它接收nmap探测报文并作出响应。但没有应用程序在其上监听。
filtered :由于包过滤阻止探测报文到达端口,nmap无法确定该端口是否开放。过滤可能来自专业的防火墙设备,路由规则 或者主机上的软件防火墙。
unfiltered :未被过滤状态意味着端口可访问,但是nmap无法确定它是开放还是关闭。 只有用于映射防火墙规则集的 ACK 扫描才会把端口分类到这个状态。
open | filtered :无法确定端口是开放还是被过滤, 开放的端口不响应就是一个例子。没有响应也可能意味着报文过滤器丢弃了探测报文或者它引发的任何反应。UDP,IP协议,FIN, Null 等扫描会引起。
closed|filtered:(关闭或者被过滤的):无法确定端口是关闭的还是被过滤的

 

nmap常用参数

  nmap扫描速度要比nc快,下面是一些基本的命令和它们的用法的例子:扫描单一的一个主机,命令如下:

 

  yum install -y nmap

 

扫描10.0.1.161服务器上1到65535所有在监听的tcp端口

 

#nmap 10.0.1.161  -p1-65535

 

指定端口范围使用-p参数,如果不指定要扫描的端口,Nmap默认扫描从1到1024再加上nmap-services列出的端口;nmap-services是一个包含大约2200个著名的服务的数据库,Nmap通过查询该数据库可以报告那些端口可能对应于什么服务器,但不一定正确。所以正确扫描一个机器开放端口的方法是上面命令:-p1-65535

注意,nmap有自己的库,存放一些已知的服务和对应端口号,假如有的服务不在nmap-services,可能nmap就不会去扫描,这就是明明一些端口已经是处于监听状态,nmap默认没扫描出来的原因,需要加入-p参数让其扫描所有端口。

虽然直接使用nmap 10.0.1.161也可以扫描出开放的端口,但是使用-p1-65535 能显示出最多的端口,区别在于不加-p 时,显示的都是已知协议的端口,对于未知协议的端口没显示,扫描10.0.1.161的1到65535所有在监听的tcp端口。

 

[root@B ~]# nmap  10.0.1.161  -p1-65535

 

Starting Nmap 5.51 ( http://nmap.org ) at 2016-12-29 10:11 CST

Nmap scan report for 10.0.1.161

Host is up (0.00017s latency).

Not shown: 65531 closed ports

PORT      STATE SERVICE

22/tcp    open  ssh

111/tcp   open  rpcbind

873/tcp   open  rsync

13306/tcp open  unknown

MAC Address: 00:0C:29:56:DE:46 (VMware)

 

Nmap done: 1 IP address (1 host up) scanned in 2.49 seconds

 

如果不加-p1-65535,对于未知服务的端口( 10.0.1.161 的13306端口)就没法扫描到

[root@B ~]# nmap  10.0.1.161

 

Starting Nmap 5.51 ( http://nmap.org ) at 2016-12-29 10:12 CST

Nmap scan report for 10.0.1.161

Host is up (0.000089s latency).

Not shown: 997 closed ports

PORT    STATE SERVICE

22/tcp  open  ssh

111/tcp open  rpcbind

873/tcp open  rsync

MAC Address: 00:0C:29:56:DE:46 (VMware)

 

Nmap done: 1 IP address (1 host up) scanned in 0.43 seconds

[root@B ~]#

 

扫描一个IP的多个端口

连续的端口可以使用横线连起来,端口之间可以使用逗号隔开,机器上再启动两个tcp的监听,分别占用7777和8888端口,用于测试,加入&符号可以放入后台

[root@A ~]# nc -l 7777&

[1] 21779

[root@A ~]# nc -l 8888&

[2] 21780

[root@A ~]#

 

开启扫描

[root@B ~]# nmap  10.0.1.161   -p20-200,7777,8888

 

Starting Nmap 5.51 ( http://nmap.org ) at 2016-12-29 10:32 CST

Nmap scan report for 10.0.1.161

Host is up (0.00038s latency).

Not shown: 179 closed ports

PORT     STATE SERVICE

22/tcp   open  ssh

111/tcp  open  rpcbind

7777/tcp open  cbt

8888/tcp open  sun-answerbook

MAC Address: 00:0C:29:56:DE:46 (VMware)

 

Nmap done: 1 IP address (1 host up) scanned in 0.17 seconds

[root@B ~]#

 

扫描udp端口

-sU:表示udp scan , udp端口扫描

-Pn:不对目标进行ping探测(不判断主机是否在线)(直接扫描端口)

对于udp端口扫描比较慢,扫描完6万多个端口需要20分钟左右

 

[root@B ~]# nmap  -sU  10.0.1.161  -Pn

 

Starting Nmap 5.51 ( http://nmap.org ) at 2016-12-29 10:16 CST

Stats: 0:12:54 elapsed; 0 hosts completed (1 up), 1 undergoing UDP Scan

UDP Scan Timing: About 75.19% done; ETC: 10:33 (0:04:16 remaining)

Stats: 0:12:55 elapsed; 0 hosts completed (1 up), 1 undergoing UDP Scan

UDP Scan Timing: About 75.29% done; ETC: 10:33 (0:04:15 remaining)

Nmap scan report for 10.0.1.161

Host is up (0.0011s latency).

Not shown: 997 closed ports

PORT    STATE           SERVICE

111/udp  open               rpcbind

123/udp  open               ntp

631/udp  open|filtered    ipp

MAC Address: 00:0C:29:56:DE:46 (VMware)

 

Nmap done: 1 IP address (1 host up) scanned in 1081.27 seconds

[root@B ~]#

 

扫描多个IP用法

中间用空格分开

[root@B ~]# nmap 10.0.1.161  10.0.1.162
 
Starting Nmap 5.51 ( http://nmap.org ) at 2016-12-29 10:18 CST
Nmap scan report for 10.0.1.161
Host is up (0.000060s latency).
Not shown: 997 closed ports
PORT    STATE SERVICE
22/tcp  open  ssh
111/tcp open  rpcbind
873/tcp open  rsync
MAC Address: 00:0C:29:56:DE:46 (VMware)
 
Nmap scan report for 10.0.1.162
Host is up (0.0000070s latency).
Not shown: 998 closed ports
PORT    STATE SERVICE
22/tcp  open  ssh
111/tcp open  rpcbind
 
Nmap done: 2 IP addresses (2 hosts up) scanned in 0.26 seconds
[root@B ~]#

 

也可以采用下面方式逗号隔开

nmap 10.0.1.161,162

[root@B ~]# nmap 10.0.1.161,162
 
Starting Nmap 5.51 ( http://nmap.org ) at 2016-12-29 10:19 CST
Nmap scan report for 10.0.1.161
Host is up (0.00025s latency).
Not shown: 997 closed ports
PORT    STATE SERVICE
22/tcp  open  ssh
111/tcp open  rpcbind
873/tcp open  rsync
MAC Address: 00:0C:29:56:DE:46 (VMware)
 
Nmap scan report for 10.0.1.162
Host is up (0.0000080s latency).
Not shown: 998 closed ports
PORT    STATE SERVICE
22/tcp  open  ssh
111/tcp open  rpcbind
 
Nmap done: 2 IP addresses (2 hosts up) scanned in 0.81 seconds
[root@B ~]#

 

扫描连续的ip地址

[root@B ~]# nmap 10.0.1.161-162

 

Starting Nmap 5.51 ( http://nmap.org ) at 2016-12-29 10:20 CST

Nmap scan report for 10.0.1.161

Host is up (0.00011s latency).

Not shown: 997 closed ports

PORT    STATE SERVICE

22/tcp  open  ssh

111/tcp open  rpcbind

873/tcp open  rsync

MAC Address: 00:0C:29:56:DE:46 (VMware)

 

Nmap scan report for 10.0.1.162

Host is up (0.0000030s latency).

Not shown: 998 closed ports

PORT    STATE SERVICE

22/tcp  open  ssh

111/tcp open  rpcbind

 

Nmap done: 2 IP addresses (2 hosts up) scanned in 0.25 seconds

[root@B ~]#

 

扫描一个子网网段所有IP

[root@B ~]# nmap  10.0.3.0/24

 

Starting Nmap 5.51 ( http://nmap.org ) at 2016-12-29 10:21 CST

Nmap scan report for 10.0.3.1

Host is up (0.020s latency).

Not shown: 997 closed ports

PORT     STATE SERVICE

23/tcp   open  telnet

6666/tcp open  irc

8888/tcp open  sun-answerbook

 

Nmap scan report for 10.0.3.2

Host is up (0.012s latency).

Not shown: 997 closed ports

PORT   STATE    SERVICE

21/tcp filtered ftp

22/tcp filtered ssh

23/tcp open     telnet

 

Nmap scan report for 10.0.3.3

Host is up (0.018s latency).

Not shown: 997 closed ports

PORT   STATE    SERVICE

21/tcp filtered ftp

22/tcp filtered ssh

23/tcp open     telnet

 

Nmap done: 256 IP addresses (3 hosts up) scanned in 14.91 seconds

[root@B ~]#

 

扫描文件里的IP

如果你有一个ip地址列表,将这个保存为一个txt文件,和namp在同一目录下,扫描这个txt内的所有主机,用法如下

[root@B ~]# cat ip.txt

10.0.1.161

10.0.1.162

[root@B ~]# nmap -iL ip.txt

 

Starting Nmap 5.51 ( http://nmap.org ) at 2016-12-29 10:23 CST

Nmap scan report for 10.0.1.161

Host is up (0.00030s latency).

Not shown: 997 closed ports

PORT    STATE SERVICE

22/tcp  open  ssh

111/tcp open  rpcbind

873/tcp open  rsync

MAC Address: 00:0C:29:56:DE:46 (VMware)

 

Nmap scan report for 10.0.1.162

Host is up (0.0000070s latency).

Not shown: 998 closed ports

PORT    STATE SERVICE

22/tcp  open  ssh

111/tcp open  rpcbind

 

Nmap done: 2 IP addresses (2 hosts up) scanned in 0.68 seconds

[root@B ~]#

 

 

扫描地址段是排除某个IP地址

 

nmap 10.0.1.161-162  --exclude 10.0.1.162

用法如下

[root@B ~]# nmap 10.0.1.161-162  --exclude 10.0.1.162

 

Starting Nmap 5.51 ( http://nmap.org ) at 2016-12-29 10:24 CST

Nmap scan report for 10.0.1.161

Host is up (0.0022s latency).

Not shown: 997 closed ports

PORT    STATE SERVICE

22/tcp  open  ssh

111/tcp open  rpcbind

873/tcp open  rsync

MAC Address: 00:0C:29:56:DE:46 (VMware)

 

Nmap done: 1 IP address (1 host up) scanned in 0.53 seconds

[root@B ~]#

 

扫描时排除多个IP地址

排除连续的,可以使用横线连接起来

[root@B ~]# nmap 10.0.1.161-163   --exclude 10.0.1.162-163
 
Starting Nmap 5.51 ( http://nmap.org ) at 2016-12-29 10:25 CST
Nmap scan report for 10.0.1.161
Host is up (0.00023s latency).
Not shown: 997 closed ports
PORT    STATE SERVICE
22/tcp  open  ssh
111/tcp open  rpcbind
873/tcp open  rsync
MAC Address: 00:0C:29:56:DE:46 (VMware)
 
Nmap done: 1 IP address (1 host up) scanned in 0.56 seconds
[root@B ~]#

 排除分散的,使用逗号隔开

[root@B ~]# nmap 10.0.1.161-163 --exclude 10.0.1.161,10.0.1.163

 

Starting Nmap 5.51 ( http://nmap.org ) at 2016-12-29 10:27 CST

Nmap scan report for 10.0.1.162

Host is up (0.0000030s latency).

Not shown: 998 closed ports

PORT    STATE SERVICE

22/tcp  open  ssh

111/tcp open  rpcbind

 

Nmap done: 1 IP address (1 host up) scanned in 0.12 seconds

[root@B ~]#

 

扫描多个地址时排除文件里的IP地址

(可以用来排除不连续的IP地址)

把10.0.1.161和10.0.1.163添加到一个文件里,文件名可以随意取

下面扫描10.0.1.161到10.0.1.163 这3个IP地址,排除10.0.1.161和10.0.1.163这两个IP

 

nmap 10.0.1.161-163  --excludefile ex.txt

 

[root@B ~]# cat ex.txt

10.0.1.161

10.0.1.163

[root@B ~]# nmap 10.0.1.161-163  --excludefile ex.txt

 

Starting Nmap 5.51 ( http://nmap.org ) at 2016-12-29 10:29 CST

Nmap scan report for 10.0.1.162

Host is up (0.0000050s latency).

Not shown: 998 closed ports

PORT    STATE SERVICE

22/tcp  open  ssh

111/tcp open  rpcbind

 

Nmap done: 1 IP address (1 host up) scanned in 0.18 seconds

[root@B ~]#